Unauthenticated Java Servlet Access
A number of sensitive Java Servlets delivered via a Java Servlet framework within the Cisco TelePresence Recording Server could allow a remote, unauthenticated attacker to perform actions that should be restricted to administrative users. To successfully exploit this vulnerability, the attacker would need the ability to submit a crafted request to an affected device on TCP port 80, TCP port 443, or TCP port 8080.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit these vulnerabilities.

Successful exploitation of the Unauthenticated Java Servlet Access (CSCtf42005) vulnerability could allow an unauthenticated, remote attacker to take complete control of the affected device or system.

CGI Command Injection
A CGI command injection vulnerability exists within the Cisco TelePresence Recording Server that could allow a remote, unauthenticated attacker to execute arbitrary commands with elevated privileges. To successfully exploit this vulnerability the attacker would need the ability to submit a malformed request to an affected device via TCP port 443.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit these vulnerabilities.

Successful exploitation of the CGI Command Injection (CSCtf97221) vulnerability could allow an unauthenticated, remote attacker to take complete control of the affected device or system.

Unauthenticated Arbitrary File Upload
An arbitrary file upload vulnerability exists within the administrative web interface of the Cisco TelePresence Recording Server. An unauthenticated, remote attacker could place content to arbitrary locations on the device by submitting crafted requests to the affected device. To successfully exploit this vulnerability the attacker would need the ability to submit a crafted request to an affected device on TCP port 80 or 443.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Successful exploitation of the Unauthenticated Arbitrary File Upload (CSCth85786) vulnerability could allow an unauthenticated, remote attacker to place or overwrite arbitrary files on the affected system. This may allow the attacker to gain full control of the affected device.

XML-RPC Arbitrary File Overwrite
An arbitrary file overwrite vulnerability exists within Cisco TelePresence Recording Server devices that could allow an unauthenticated, remote attacker to overwrite arbitrary files with logging data. This vulnerability could be leveraged to obtain full control of the affected device. To successfully exploit this vulnerability the attacker would need the ability to submit a malformed request to an affected device via TCP port 12102 or 12104.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Successful exploitation of the XML-RPC Arbitrary File Overwrite (CSCti50739) vulnerability could allow an unauthenticated, remote attacker to create a denial of service condition. In some instances this issue could be leveraged to gain complete control of the affected system.

Because Cisco Discovery Protocol works at the data-link layer (Layer 2), an attacker must have a way to submit an Ethernet frame directly to an affected device. This may be possible in situations where the affected system is part of a bridged network or connected to a nonpartitioned device such as a network hub.

Successful exploitation of the Cisco Discovery Protocol Remote Code Execution (CSCtd75769) vulnerability could allow an unauthenticated, adjacent attacker to take complete control of the affected system.

Ad Hoc Recording Denial of Service
A denial of service vulnerability exists within Cisco TelePresence Recording Server devices. The vulnerability could allow an unauthenticated, remote attacker to cause all recording and playback threads on the device to be consumed. A restart of the affected device may be required to regain functionality. To successfully exploit this vulnerability the attacker would need the ability to submit a malformed request to an affected device via TCP port 80.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Successful exploitation of the Ad Hoc Recording Denial of Service (CSCtf97205) vulnerability could allow an unauthenticated, remote attacker to cause a persistent denial of service condition on an affected device.

Java RMI Denial of Service
A denial of service vulnerability exists within Cisco TelePresence Recording Server devices due to a failure to properly restrict access to the RMI interface of the Java Servlet framework. An unauthenticated, remote attacker could trigger an out-of-memory condition on the Servlet host by issuing a series of crafted requests. To successfully exploit this vulnerability the attacker would need the ability to communicate to an affected device on TCP port 8999.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Successful exploitation of the Java RMI Denial of Service (CSCtg35830) vulnerability could allow an unauthenticated, remote attacker to cause all web-based services to become inaccessible.

Unauthenticated XML-RPC Interface
An unauthenticated XML-RPC interface exists within Cisco TelePresence Recording Server devices. This vulnerability could allow an unauthenticated, remote attacker to perform a limited number of actions on the system that should be restricted to authorized users. To successfully exploit this vulnerability the attacker would need the ability to communicate to an affected device on TCP port 8080.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Successful exploitation of the Unauthenticated XML-RPC Interface (CSCtg35833) vulnerability could allow an unauthenticated, remote attacker to perform a number of actions that should be restricted to authenticated users.

Patch Availability:
When considering software upgrades, also consulthttp://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete upgrade solution.